共 50 条
[21]
Information Security Policies: A Review of Challenges and Influencing Factors
[J].
2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST),
2016,
:352-358
[22]
Main Considerations in Elaborating Organizational Information Security Policies
[J].
COMPUTER SYSTEMS AND TECHNOLOGIES,
2019,
:68-73
[24]
CRITICAL CONSIDERATIONS FOR ORGANIZATION-SPECIFIC INFORMATION SECURITY POLICY DEVELOPMENT
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TRANSFORMATIONS AND INNOVATIONS IN MANAGEMENT (ICTIM 2017),
2017, 37
:813-822
[25]
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
[J].
Information Systems Frontiers,
2020, 22
:221-242
[27]
Using Galois Lattice to Represent and Analyze Information Security Policy Compliance
[J].
PROCEEDINGS OF THE 5TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION (IEMI2014),
2015,
:353-358
[28]
Identifying linkages between statements in information security policy, procedures and controls
[J].
Information Management and Computer Security,
2012, 20 (04)
:264-280
[29]
Automating Information Security Policy Compliance Checking
[J].
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT),
2018,
[30]
Readability as a Basis for Information Security Policy Assessment
[J].
2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST),
2017,
:113-120